Skip to main content

Co-resident Attack in Cloud Computing: An Overview

  • Reference work entry
  • First Online:
Encyclopedia of Big Data Technologies

Abstract

A cloud rewards organizations with agility and cost-efficiency, but goods of the cloud come with security challenges. The sheer volume and immense size of modern-day clouds (big data) make them hard to protect and consequently, vulnerable to abuse. Security and privacy issues are intensified by velocity, volume, and a variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, and a massive amount of inter-cloud migration. The virtualization method allows sharing of computing resources among many tenants, which may be business partners, suppliers, competitors, or attackers. Even though there is substantial logical isolation among the virtual machines (VMs), shared hardware creates vulnerabilities to co-resident attacks. This paper gives a glimpse of security issues in the cloud, specifically related to VMs. Here, we concentrate our study on co-resident VM attack and its defense methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bhargava B, Çho Y, Kim A (2010) Research in cloud security and privacy. https://www.cs.purdue.edu/homes/bb/cloud/Security-Privacy.ppt

  • Cloud-Security-Alliance (2012) Top ten big data security and privacy challenges. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Top_Ten_v1.pdf

  • Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BIP (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570

    Article  Google Scholar 

  • Han Y, Chan J, Alpcan T, Leckie C (2017) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans Dependable Secure Comput 14(1):95–108

    Google Scholar 

  • Hyde D (2009) A survey on the security of virtual machines. www.cse.wustl.edu/jain/cse571-09/ftp/vmsec/index.html

  • Inukollu VN, Arsi S, Ravuri SR (2014) Security issues associated with big data in cloud computing. Int J Netw Secur Appl 6(3):45

    Google Scholar 

  • Mishra SK, Putha D, Rodrigues JJ, Sahoo B, Dutkiewicz E (2018a, in press) Sustainable service allocation using metaheuristic technique in fog server for industrial applications. IEEE Trans Ind Inf

    Google Scholar 

  • Mishra SK, Puthal D, Sahoo B, Jena SK, Obaidat MS (2018b) An adaptive task allocation technique for green cloud computing. J Supercomput 74(1):370–385

    Article  Google Scholar 

  • Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63(2):561–592

    Article  Google Scholar 

  • Puthal D, Sahoo B, Mishra S, Swain S (2015) Cloud computing features, issues, and challenges: a big picture. In: Computational Intelligence and Networks (CINE), 2015 International Conference on, IEEE, pp 116–123

    Google Scholar 

  • Sahoo S, Nawaz S, Mishra SK, Sahoo B (2015) Execution of real time task on cloud environment. In: India Conference (INDICON), 2015 Annual IEEE, IEEE, pp 1–5

    Google Scholar 

  • Sahoo S, Sahoo B, Turuk AK, Mishra SK (2016) Real time task execution in cloud using mapreduce framework. In: Resource management and efficiency in cloud computing environments, IGI Global, p 190

    Google Scholar 

  • Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutorials 15(2):843–859

    Article  Google Scholar 

  • Zhang Y, Juels A, Oprea A, Reiter MK (2011) Homealone: co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE Symposium on Security and Privacy, pp 313–328

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sahoo, S., Mishra, S.K., Sahoo, B., Turuk, A.K. (2019). Co-resident Attack in Cloud Computing: An Overview. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_322

Download citation

Publish with us

Policies and ethics